進攻的行動 的英文怎麼說

中文拼音 [jìngōngdehángdòng]
進攻的行動 英文
aggressive action campaign or attitude attack
  • : 進構詞成分。
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 4次方是 The fourth power of 2 is direction
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • 進攻 : attack; assault; offensive
  • 行動 : 1 (行走; 走動) move about; get about 2 (為實現某種意圖而活動) act; take action 3 (行為; 舉動...
  1. His suicide was a sacrifice to absolve himself and his people from guilt in the german attack upon yugoslavia.

    自殺是為他自己和他人民贖罪,贖取他們在德國南斯拉夫中所犯下而作出犧牲。
  2. It ’ s often used to cover the special target in special area or is used to make false attacking situation. these small light and cheap jamming devices always are thrown to the area near the target. they are manipulated or not to jam the foe ’ s military electronic device such as radar and radio etc. the device weighs about one kilogram and is as big as mauley

    分散式干擾是在無人機機載和氣球載干擾機等形式上發展起來電子對抗設備,通常是為了掩護特定區域目標或在某一地區內製造假態勢,將眾多體積小、質量輕、價格便宜小型干擾源散布在接近被干擾目標空域、地域上,自地或受控地對選定軍事電子設備干擾。
  3. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統為、審計系統配置和漏洞、評估敏感系統和數據完整性、識別為、對異常統計和審計、自地收集和系統相關補丁、使用誘騙服務器記錄黑客為等功能,使系統管理員可以較有效地監視、審計、評估自己系統。
  4. The mission is nato ' s largest ground operation in its 57 - year history, and its forces have launched a major offensive in the taleban ' s traditional stronghold in southern afghanistan, aimed at heading off insurgent violence

    這是北大西洋公約組織成立57年來最大地面軍事,並已經在塔歷班傳統控制地帶南部阿富汗,目標是解除那裡暴力武裝。
  5. A major operation through spain into northwest africa would have prejudiced both these tremendous adventures.

    假道西班牙西北非大規模軍事,對這兩個巨大軍事冒險都是有害
  6. Five years after endor, grand admiral thrawn attacked ord mantell to keep the new republic off balance while he continued his campaign to retake coruscant

    恩多(戰役)后五年,大元帥索龍曼特爾兵站,使新共和國處于蕩狀態,同時他繼續奪取科洛桑戰役。
  7. According to all discussed above, adopted typical mobile agent system ibm aglets to design a framework of mobile agent based intrusion detection system and various functional mobile agents, analyzed data collection, detection and tracing of intruding attacks of the concurrent multiple mobile agents. those mobile agents trace and watch the network equipments and hosts in real time, study net flow and status of the hosts, analyze and audit the outcome data, then give real time alarms for the aggressive activities

    在此基礎上,採用典型移代理系統ibmaglets設計了一種基於移代理入侵檢測系統框架,並設計了不同功能代理,分析多個移代理協作數據採集與跟蹤檢測入侵過程,這些移代理實時跟蹤監視網路設備和主機,了解網路上流量和主機狀態,並對結果數據分析審計,做出一定響應。
  8. After target is detected the on - board avionics suite in combination with the automatic control system of the helicopter solve the task of bringing the helicopter to the designated point and automatic firing of the weapons selected by the pilot

    當捕獲目標后,機上控制系統與電子系統將解算任務數據,引導直升機飛向敵潛艇水域,並在飛員指令準許下自發射武器擊。
  9. The flexibility of seaborne attack in an ocean area is the most remarkable feature of these operations.

    這些軍事最顯著特點,就是在一個海洋區域內從海上靈活性。
  10. That the viceroy will take possession of the village borodino, and cross by its three bridges, following to the same high ground as morands and friants divisions nothing is said of whence and when they were to advance, which under his leadership will advance to the redoubt and form in a line with the other troops

    第四項:總督要佔領那個村子波羅底諾,然後越過三座橋,協同莫朗和熱拉爾兩師直趨高地對他們方向和時間並未發出指示,總督率領兩個師多角堡,並與其他部隊入戰斗。
  11. From that time up to the end of the campaign, all kutuzovs activity was limited to trying by the exercise of authority, by guile and by entreaties, to hold his army back from useless attacks, manuvres, and skirmishes with the perishing enemy

    自從獲悉法國人撤出莫斯科直至戰役結束,庫圖佐夫全部活是:用權力計謀勸告來阻止軍隊打無益戰與將滅亡敵人沖突。
  12. The theme is an important part of province project for tackling key problem concerning the development of minitype welding and repairing instrument suiting for working in the turbine pit, the theme is worked in the welding and grinding robot. with d - h method the kinetic coordinate and equations are built which is the base of controlling robot

    本課題是省科技關項目「機坑內修復小型焊補機研製」重要組成部分,本文研究工作是針對水輪機修復專用機器人,應用d - h方法建立了此機器人各關節之間坐標關系及其運學正問題方程,為機器人系統控制提供了可靠依據。
  13. In other words, plan your attacks far in advance, and try to see every angle before barging in and attempting to take control of your selected target

    換句話說,請事先做好您計劃,並且在採取軍事控制目標前,請嘗試從每個角度考慮問題。
  14. This paper gives a brief introduction of the visualized modelling approach to combat plan which is based on uml, puts forward the static describing framework and presenting approach of dynamic actions and illustrates this modeling approach by the examples of the aire force ' s attack plan

    簡要介紹基於統一建模語言( uml )作戰計劃可視化建模方法,提出了作戰計劃靜態描述框架和表示方法,並通過空軍計劃實例來說明該建模方法。
  15. Basing on the requirement of the project supported by chongqing science and technology committee, the study and development on original non - frictional and sequential operation ' s stepless speed regulator, the author has made some analysis to the physical principle and speed adjustment principle. in addition, as the main part of stepless speed regulators, the transformer was more concerned in the study. after probing the creation of its structure principle, this paper reveals its structure and dynamics rule, and creates a dynamics model and synthesis model of transformer

    根據重慶市科委技術關項目《新型非摩擦式連續作用機械無級變速器研製與開發》要求,對該無級變速器工作原理、調速原理及工作性能分析,並著重對無級變速器核心部件轉換器分析,對其結構原理創新深入探討,揭示了其結構及運實質;建立了轉換器學模型和綜合模型;對以轉換器這類以連桿作為輸出構件曲柄搖桿機構規律及其影響因素,首次了較深入、系統分析研究,得出了一系列以連桿作為輸出構件曲柄搖桿機構規律。
  16. Mr yusuf says there is now a “ gentleman ' s agreement ” between gaza ' s assorted armed factions to attack israel only in response to israeli actions, such as its killing of several militants in gaza this week

    尤素福稱,目前在加沙各色武裝派別中有一個「君子協定」 ,即僅對在以色列採取擊以色列以作回應,例如以色列本周在加沙槍殺幾名激分子
  17. Method of probability and statistics is used in the software, to analyze the action of adversaries, for it ca n ' t be forecasted that when would the adversaries intrude the facility. in statistics, we consider there is a rule of such incidents or accidents

    對于敵手核設施這樣事件,我們不可能預知其確切結果,但通過研究,可以尋找其規律性,用概率和數理統計方法來分析敵手,揭示其統計規律性,才可以有效地防範敵手入侵。
  18. Abstract : using literature, logic deduction and other methods, this article analyses the defensive techniques and tactics of modern basketball and puts forward some countermeasures to change the current situation in which basketball defense falls behind offense in our country

    文摘:本文採用文獻資料、邏輯演繹研究方法,對現代籃球運中防守技術、戰術發展特點分析,針對我國籃球防守落後于現狀,提出改變這一現狀對策。
  19. New trend in development of us military space technology is overviewed, such as us air force four space mission areas which include space force enhancement, space force apllication, space support and space counter, operationally responsive space ( ors ), new space millitary carrying vehicles, small military satellites and advanced missile defense technology also discribeted

    摘要綜述了美國在軍事空間技術新發展向,包括美國空軍「空間軍力加強、空間軍力應用、空間支授、空間對抗」四大空間軍事任務區,快速響應空間,新空天器,軍事小衛星運載器,軍事小衛星,導彈防禦先技術等發展態。
  20. No, we mustnt forget suvorov and his rulenever to put oneself in a position to be attacked, but to make the attack oneself

    不,不應當忘記蘇沃洛夫及其為準則:不要使自己處于遭受地位,自己要發
分享友人